URL: http://u969805bd9.ha005.t.justns.ru/n7EQQQRFTwyzJGTw/login.php
Submission Tags: c2 malware kpot Search All
Submission: On December 23 via api from US

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 1 HTTP transactions. The main IP is 185.22.155.46, located in Russian Federation and belongs to ASBAXET, RU. The main domain is u969805bd9.ha005.t.justns.ru.
This is the only time u969805bd9.ha005.t.justns.ru was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 185.22.155.46 51659 (ASBAXET)
1 1
Apex Domain
Subdomains
Transfer
1 justns.ru
u969805bd9.ha005.t.justns.ru
566 B
1 1
Domain Requested by
1 u969805bd9.ha005.t.justns.ru
1 1

This site contains no links.

Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://u969805bd9.ha005.t.justns.ru/n7EQQQRFTwyzJGTw/login.php
Frame ID: 7E626E4425BCD06ADEB4928DEE670F11
Requests: 1 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • url /\.php(?:$|\?)/i

Overall confidence: 100%
Detected patterns
  • headers server /^LiteSpeed$/i

Page Statistics

1
Requests

0 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

1 kB
Transfer

0 kB
Size

1
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request Cookie set login.php
u969805bd9.ha005.t.justns.ru/n7EQQQRFTwyzJGTw/
231 B
566 B
Document
General
Full URL
http://u969805bd9.ha005.t.justns.ru/n7EQQQRFTwyzJGTw/login.php
Protocol
HTTP/1.1
Server
185.22.155.46 , Russian Federation, ASN51659 (ASBAXET, RU),
Reverse DNS
Software
LiteSpeed /
Resource Hash
e7ad367f84eb1db1f3f182105b668f1691f981f4948dfa0771d04de0097021aa

Request headers

Host
u969805bd9.ha005.t.justns.ru
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding
gzip, deflate
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Connection
Keep-Alive
Set-Cookie
PHPSESSID=o78u43j10dkuepbfgta2mqald2; expires=Tue, 15-Dec-2071 10:10:16 GMT; path=/
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
Content-Type
text/html
Content-Length
129
Content-Encoding
gzip
Vary
Accept-Encoding,User-Agent
Date
Wed, 23 Dec 2020 04:50:08 GMT
Server
LiteSpeed

Verdicts & Comments Add Verdict or Comment

5 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| trustedTypes boolean| crossOriginIsolated

1 Cookies

Domain/Path Name / Value
u969805bd9.ha005.t.justns.ru/ Name: PHPSESSID
Value: o78u43j10dkuepbfgta2mqald2

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

u969805bd9.ha005.t.justns.ru
185.22.155.46
e7ad367f84eb1db1f3f182105b668f1691f981f4948dfa0771d04de0097021aa